Weaponizing middleboxes
Weaponizing middleboxes
Posted Sep 22, 2021 1:52 UTC (Wed) by ttuttle (subscriber, #51118)In reply to: Weaponizing middleboxes by bferrell
Parent article: Weaponizing middleboxes
Posted Sep 22, 2021 2:18 UTC (Wed)
by pabs (subscriber, #43278)
[Link] (7 responses)
Posted Sep 22, 2021 2:22 UTC (Wed)
by ttuttle (subscriber, #51118)
[Link] (6 responses)
Nobody *wants* to do the kind of horrid TCP/UDP/IP hacks that middleboxes do; it's only necessary because they're not formally delegated to handle the connections and answer the requests they want to.
Posted Sep 22, 2021 2:37 UTC (Wed)
by pabs (subscriber, #43278)
[Link] (5 responses)
Posted Sep 22, 2021 4:52 UTC (Wed)
by ttuttle (subscriber, #51118)
[Link]
Posted Sep 22, 2021 12:07 UTC (Wed)
by james (subscriber, #1325)
[Link] (3 responses)
They support either:
The site does get to control which option Cloudflare will use: it's the first thing you'll see under TLS in the Cloudflare configuration site (and you have to go past that to enable user-to-Cloudflare TLS).
Rather more sketchy is their description of this as "end-to-end encryption" when Cloudflare is very obviously decrypting and re-encrypting the traffic.
Posted Sep 25, 2021 11:32 UTC (Sat)
by nilsmeyer (guest, #122604)
[Link] (2 responses)
I agree, this also seems to evade the privacy policy that all supposedly encrypted (there's a padlock in front of the URL!) data is shared with the CDN provider or whoever provides the load balancer.
Posted Sep 25, 2021 12:57 UTC (Sat)
by mbunkus (subscriber, #87248)
[Link] (1 responses)
And to be honest, I really have no quarrels with that kind of a model. I'm much more concerned about the myriad of half-incompetent people not configuring their data storage correctly & having my credit card information in world-readable databases or S3 buckets. 'cause that happens all the time, whereas one of the big CDNs somehow leaking your data… not so much.
Posted Sep 29, 2021 15:31 UTC (Wed)
by nilsmeyer (guest, #122604)
[Link]
Weaponizing middleboxes
Weaponizing middleboxes
Weaponizing middleboxes
Weaponizing middleboxes
Weaponizing middleboxes
As an example, ISTR reading about a CDN that was offering TLS encrypted connections, but either doing plain-text connections to the backend infrastructure or doing TLS connections but not verifying the certificates.
You could well be describing Cloudflare.
all while (normally) presenting the end-user with a valid TLS certificate.
Weaponizing middleboxes
Weaponizing middleboxes
Weaponizing middleboxes